Closed renovate[bot] closed 2 years ago
Warnings | |
---|---|
:warning: | Please add a label to your PR. |
:warning: | Please assign someone to merge this PR, and optionally include people who should review. |
:warning: | Changes were made to package.json, but not to licenses.csv - Perhaps you need to run `$ yarn run license`? |
Generated by :no_entry_sign: dangerJS
Deploy preview for mcs-lite-ui ready!
Built with commit 0a62d763fae8eac6458adfeac386180274202bbc
Deploy preview for mcslite ready!
Built with commit 0a62d763fae8eac6458adfeac386180274202bbc
Deploy preview for mcs-lite-introduction ready!
Built with commit 0a62d763fae8eac6458adfeac386180274202bbc
https://deploy-preview-673--mcs-lite-introduction.netlify.com
Merging #673 into master will not change coverage. The diff coverage is
n/a
.
@@ Coverage Diff @@
## master #673 +/- ##
=======================================
Coverage 83.77% 83.77%
=======================================
Files 326 326
Lines 2694 2694
Branches 174 174
=======================================
Hits 2257 2257
Misses 372 372
Partials 65 65
Continue to review full report at Codecov.
Legend - Click here to learn more
Ξ = absolute <relative> (impact)
,ΓΈ = not affected
,? = missing data
Powered by Codecov. Last update ae921c2...0a62d76. Read the comment docs.
This PR contains the following updates:
16.3.2
->16.3.3
GitHub Vulnerability Alerts
CVE-2018-6341
Affected versions of
react-dom
are vulnerable to Cross-Site Scripting (XSS). The package fails to validate attribute names in HTML tags which may lead to Cross-Site Scripting in specific scenarios. This may allow attackers to execute arbitrary JavaScript in the victim's browser. To be affected by this vulnerability, the application needs to:ReactDOMServer
Recommendation
If you are using
react-dom
16.0.x, upgrade to 16.0.1 or later.If you are using
react-dom
16.1.x, upgrade to 16.1.2 or later.If you are using
react-dom
16.2.x, upgrade to 16.2.1 or later.If you are using
react-dom
16.3.x, upgrade to 16.3.3 or later.If you are using
react-dom
16.4.x, upgrade to 16.4.2 or later.Release Notes
facebook/react
### [`v16.3.3`](https://togithub.com/facebook/react/blob/master/CHANGELOG.md#1633-August-1-2018) ##### React DOM Server - Fix a [potential XSS vulnerability when the attacker controls an attribute name](https://reactjs.org/blog/2018/08/01/react-v-16-4-2.html) (`CVE-2018-6341`). This fix is available in the latest `react-dom@16.4.2`, as well as in previous affected minor versions: `react-dom@16.0.1`, `react-dom@16.1.2`, `react-dom@16.2.1`, and `react-dom@16.3.3`. ([@gaearon](https://togithub.com/gaearon) in [#13302](https://togithub.com/facebook/react/pull/13302))Configuration
π Schedule: "" (UTC).
π¦ Automerge: Disabled by config. Please merge this manually once you are satisfied.
β»οΈ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
π Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by WhiteSource Renovate. View repository job log here.